2.8 KiB
2.8 KiB
Security Best Practices / Xavfsizlik bo'yicha eng yaxshi amaliyotlar
English
Important Security Notes
-
Change Default Credentials
- Never use the default password
2309in production - Change the admin phone number from the default value
- Generate a strong SECRET_KEY for production
- Never use the default password
-
Environment Variables
- Never commit
.envfile to version control - Keep production credentials secure and separate from development
- Use strong passwords for database and admin accounts
- Never commit
-
Database Security
- Change default database password in production
- Use strong passwords for PostgreSQL
- Restrict database access to specific IP addresses
-
Django Security Settings
- Set
DEBUG=Falsein production - Configure proper
ALLOWED_HOSTS - Use HTTPS in production (
PROTOCOL_HTTPS=True) - Keep
SECRET_KEYsecret and unique per environment
- Set
-
API Security
- Configure proper CORS settings
- Use CSRF protection
- Implement rate limiting
- Use JWT tokens with appropriate expiration times
-
Docker Security
- Don't expose unnecessary ports
- Use docker secrets for sensitive data
- Keep Docker images updated
O'zbekcha
Muhim xavfsizlik eslatmalari
-
Standart parollarni o'zgartiring
- Production muhitida hech qachon standart parol
2309dan foydalanmang - Admin telefon raqamini standart qiymatdan o'zgartiring
- Production uchun kuchli SECRET_KEY yarating
- Production muhitida hech qachon standart parol
-
Environment o'zgaruvchilari
- Hech qachon
.envfaylini git repozitoriyasiga commit qilmang - Production ma'lumotlarini xavfsiz va developmentdan alohida saqlang
- Ma'lumotlar bazasi va admin akkountlari uchun kuchli parollar ishlating
- Hech qachon
-
Ma'lumotlar bazasi xavfsizligi
- Production muhitida standart parolni o'zgartiring
- PostgreSQL uchun kuchli parollar ishlating
- Ma'lumotlar bazasiga kirishni muayyan IP manzillarga cheklang
-
Django xavfsizlik sozlamalari
- Production muhitida
DEBUG=Falseqiling - To'g'ri
ALLOWED_HOSTSsozlang - Production muhitida HTTPS dan foydalaning (
PROTOCOL_HTTPS=True) SECRET_KEYni maxfiy va har bir muhitda noyob qiling
- Production muhitida
-
API xavfsizligi
- To'g'ri CORS sozlamalarini o'rnating
- CSRF himoyasidan foydalaning
- Rate limiting ni amalga oshiring
- JWT tokenlarni to'g'ri muddatda ishlating
-
Docker xavfsizligi
- Keraksiz portlarni ochib qo'ymang
- Maxfiy ma'lumotlar uchun docker secrets dan foydalaning
- Docker imagelarni yangilab turing
Reporting Security Issues / Xavfsizlik muammolarini xabar qilish
If you discover a security vulnerability, please email the maintainers directly instead of using the issue tracker.
Agar xavfsizlik zaifligini topsangiz, iltimos issue tracker o'rniga to'g'ridan-to'g'ri maintainerlar ga email yuboring.